Static task
static1
General
-
Target
c3f8f65bb5cf4f6414efa8ada93ddaca
-
Size
24KB
-
MD5
c3f8f65bb5cf4f6414efa8ada93ddaca
-
SHA1
1152ac71e079a9d8ca23bcd4e6ad15355843e56a
-
SHA256
c0055097128e7c8390cf38c601f99917d15139e45cc03e9ab52d3bb8bac0dc31
-
SHA512
d2196f50b3e9af459009bf4d73e60723c4d29469989041eb8a0ea85fbc497b153f57665b8ff57a4538377cf8cb543e52c94629d8c63c8cce607a48f0bf4a0f62
-
SSDEEP
384:nQdL4Gk9b1XWqnCNxh3a41iaBzMbZzM1PIQhFdojdBG0rInOvQ4R+nm6i9LKx:QSnnCNLa4RW+7+GAInOvQNnmX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3f8f65bb5cf4f6414efa8ada93ddaca
Files
-
c3f8f65bb5cf4f6414efa8ada93ddaca.sys windows:4 windows x86 arch:x86
24f9b0655f130c74eee8473cecd98e42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmIsAddressValid
ZwClose
RtlInitUnicodeString
RtlAnsiStringToUnicodeString
IofCompleteRequest
wcscat
swprintf
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwQuerySystemInformation
wcscpy
_stricmp
strncpy
wcslen
ZwUnmapViewOfSection
RtlCopyUnicodeString
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
_wcsnicmp
IoGetCurrentProcess
ObfDereferenceObject
ObQueryNameString
MmGetSystemRoutineAddress
KeServiceDescriptorTable
_except_handler3
_strnicmp
RtlCompareUnicodeString
ExGetPreviousMode
strncmp
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 756B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 928B - Virtual size: 914B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ